10 years of experience in incident response in russian
play

10 years of experience in incident response in Russian Federation - PowerPoint PPT Presentation

10 years of experience in incident response in Russian Federation 12-17 June 2011 Vienna About 1998. Start as RIPN (Russian Institute of Public Networks) project 1998 as CSIRT of RBNET (NREN) FIRST, TI member 2011. RU-CERT -


  1. 10 years of experience in incident response in Russian Federation 12-17 June 2011 Vienna

  2. About • 1998. Start as RIPN (Russian Institute of Public Networks) project 1998 as CSIRT of RBNET (NREN) • FIRST, TI member • 2011. RU-CERT - non-commercial organization that plays a role of a national level CSIRT team of Russian Federation • Hours of work - 10:00-18:00 every day, except weekends and national holidays • Responsibility domain – whole Russian address space • Funding model - sponsorship 12-17 June 2011 Vienna

  3. OPERATIONAL DETAILS Environment - reality • No authority over ISPs, domain registrars, etc. • No IP resources under control Mode of operation 1. Gathering (getting) all the information about malicious Russian resources and network activity related to Russian address space 2. Information analysis and verification 3. Attempting to solve the problem 12-17 June 2011 Vienna

  4. Mode of operation (continued) Resource owner E-Mails contact Phone calls Authority Feeds contact 12-17 June 2011 Vienna

  5. Another operational mode • Dispatching urgent requests to Russian LEA Requests direction 1. Foreign countries -> Russia 95% 2. Russia -> Foreign countries 1% 3. Russia -> Russia 4% 12-17 June 2011 Vienna

  6. INPUT details Incidents processed All kinds of «typical» incidents, except SPAM cases 12-17 June 2011 Vienna

  7. Feed sources • Arbor Networks • Shadowserver • Abuse.ch bundle • Malwaredomainlist • CleanMX • Phishtank • Malc0de • Team Cymru • Some other ’ s (3-4, incl. temporary) 12-17 June 2011 Vienna

  8. Feed data volume (average/ per day) Type New Unique Summary Phishing 62 176 199 MW 250 508 523 C&C 4 31 32 12-17 June 2011 Vienna

  9. Top list of e-mails input (5 months) MW Phishin Attack g s mycert@mycert.org. 126 105 my auscert@auscert.org. 219 6 au ftsteam@paypal.com 14 189 cert@cert.br 100 68 csirt@bradesco.com. 70 34 br @markmonitor.com 76 19 @brandprotect.com 32 83 12-17 June 2011 Vienna cais@cais.rnp.br 65

  10. СС /TO balance statistic RU-CERT RU-CERT in TO in СС field field mycert@mycert.org.my 110 121 auscert@auscert.org.au 17 208 ftsteam@paypal.com 4 198 cert@cert.br 168 csirt@bradesco.com.br 104 24 @markmonitor.com 67 14 @brandprotect.com 92 23 cais@cais.rnp.br 65 afcc@rsa.com 57 12-17 June 2011 Vienna

  11. Information processing Security event – any information related to computer security case Incident – SE, that RU-CERT reacts to in some way 12-17 June 2011 Vienna

  12. Will SE be transformed into Incident or not significantly depends on results of verification: Phishing • 95-98% of all requests are really phishing resources • ~80% of phishing resources are located on compromised servers • Second level domains used for phishing sites – lately occurs very seldom • Most cases - non-Russian banks and payment systems Malware 70-75% can be verified (MHR, etc) Attacks Unverified C&C 10-15% can be verified 12-17 June 2011 Vienna

  13. Contact details 1. Resource owners – more than 600 contacts in RU- CERT database 2. LEA ’ s – 3-4 с ases/per month 3. CCTLD (Coordination Center of Russian TLD zone) (domains in .ru/. рф zones) Monitoring model 12-17 June 2011 Vienna

  14. Incident processing software 12-17 June 2011 Vienna

  15. INCIDENT PROCESSING STATS Summary (mw/phishing) 2010 12-17 June 2011 Vienna

  16. Destination geographic distribution City MW Phishing Moscow 3054 (47.07%) 191 (12%) St. Petersburg 609 (9.38%) 22 (1.4%) 12-17 June 2011 Vienna

  17. Difficulties (technical) • Incorrect information in RIPE database • Small net objects often not listed in database • AS ’ s ownership often can ’ t be discovered without ISP support (VPN) 12-17 June 2011 Vienna

  18. Effectiveness Not easy to estimate – but performance index is positive because of: • We have a lot of established contacts with ISPs/domain registrars • Better chance to find out correct contacts (5-6 calls chain is normal) • Requests coming from a Russian organization are usually treated in a more friendly manner 12-17 June 2011 Vienna

  19. Questions ganev@cert.ru, info@cert.ru http://www.cert.ru/ 12-17 June 2011 Vienna

Recommend


More recommend